Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for the AWS_MSK_IAM SASL mechanism #313

Merged
merged 1 commit into from
Mar 12, 2024

Conversation

Dawnflash
Copy link
Contributor

@Dawnflash Dawnflash commented Mar 11, 2024

AWS_MSK_IAM is an OAUTHBEARER-based SASL mechanism for accessing AWS MSK clusters using AWS IAM.
The OAUTH token is supplied by AWS APIs so it fits nicely into the already written OAUTH token provider.

Uses https://github.com/aws/aws-msk-iam-sasl-signer-go with the region inferred by the AWS SDK. I decided not to add explicit region configuration to the config to keep it cleaner but that would be an easy addition as well.

Resolves #198.

Copy link
Owner

@birdayz birdayz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nice and clean. thank you!

@birdayz birdayz merged commit fde2262 into birdayz:master Mar 12, 2024
1 check passed
@yermulnik
Copy link

@birdayz Is this going to be wrapped into a new kaf release please?

@yermulnik
Copy link

@Dawnflash I've just wanted to try and use kaf to connect to MSK using IAM Auth, though I couldn't figure out how to use AWS CLI profile for authentication. Could you please assist? Thanks in advance.

@Dawnflash
Copy link
Contributor Author

Dawnflash commented Oct 10, 2024

@yermulnik try this

SASL:
  username: ""
  mechanism: AWS_MSK_IAM
TLS: null
security-protocol: SASL_SSL

To use a profile just export the AWS_PROFILE envvar.

@yermulnik
Copy link

@Dawnflash That worked! Thanks a lot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support for IAM + AWS Managed Kafka (MSK)
3 participants